2020
DOI: 10.1007/s42979-020-0080-2
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Steganography Approach for Audio Files

Abstract: We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm, while images are compressed by the GMPR technique which is based on the Discrete Cosine Transform and high-frequency minimization encoding algorithm. The method involves compression-encryption of an image file by the GMPR technique followed by hiding it into audio data by appropriate bi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…The data hiding concept is presented as a tool for protecting the audio signal in [26]. The authors in this research work proposed the watermarking technique to secure the audio signals.…”
Section: Related Workmentioning
confidence: 99%
“…The data hiding concept is presented as a tool for protecting the audio signal in [26]. The authors in this research work proposed the watermarking technique to secure the audio signals.…”
Section: Related Workmentioning
confidence: 99%
“…This quantum model was simulated and tested many times with different wave files [23]. Abdulrazzaq et al [24] studied a method that included compression-encryption of an image in an audio file. The image file was compressed by the GMPR technique that used the discrete cosine transform and high-frequency minimization encoding scheme.…”
Section: Steganography Studiesmentioning
confidence: 99%
“…On the other hand, if the snoopers extract the bits, group them into sound, and listen to them, then it won't be apparent because of the random scattering of the values. For this, the only authorized user who knows the conversion algorithm and distribution key can extract the data and recover the audio file from the cached image [24]. The type * .tiff is used to store the image that resulted from converting the audio file because it preserves all the values of the image without compression, thereby making it suitable to retain all the details of the original file.…”
Section: Characteristics Of Transformationmentioning
confidence: 99%
“…To improve the undetectability of secret data, Ref. [32] proposed a framework based on Generative Adversarial Networks (GANs) to implement optimal embedding for audio steganography in the temporal domain, whereas the authors of [33] proposed a generalized joint adaptive intra-frame and adaptive inter-frame steganography method (called AHCM) within compressed audio streaming and implemented an AdaMP3Stego algorithm in MP3 audio based on the psychoacoustic model. To ensure hidden data robustness against LSB removal and re-sampling attacks, Ref.…”
Section: Related Workmentioning
confidence: 99%